SQL injection is the most common method of piracy and famous. Using this method an unauthorized person can access the site database. The attacker can get all the details of the database.

What can an attacker?

* The Easy sign-up

* Access to secret information

* Modify the contents of the site

* My SQL Server shuts down

Let us now delve into the actual process of SQL injection.

Follow my steps.

Step 1: Search the site vulnerable

Our best partners to SQL injection is Google. We can find vulnerable sites (hackable sites) using the Google Dork list. Dork Google search for vulnerable sites through Google search tips. There are a lot of stuff to search Google. But we will use "inurl:" command to find vulnerable sites.